{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:35:57Z","timestamp":1725521757238},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540898993"},{"type":"electronic","value":"9783540899006"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89900-6_7","type":"book-chapter","created":{"date-parts":[[2008,11,26]],"date-time":"2008-11-26T18:24:21Z","timestamp":1227723861000},"page":"39-50","source":"Crossref","is-referenced-by-count":2,"title":["Computational Modeling of Criminal Activity"],"prefix":"10.1007","author":[{"given":"Uwe","family":"Gl\u00e4sser","sequence":"first","affiliation":[]},{"given":"Mona","family":"Vajihollahi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","volume-title":"Patterns in Crime","author":"P.J. Brantingham","year":"1984","unstructured":"Brantingham, P.J., Brantingham, P.L.: Patterns in Crime. Macmillan Publishing Company, New York (1984)"},{"key":"7_CR2","unstructured":"D\u2019Amico, J.: Stopping Crime in Real Time. The Police Chief \u2013 The Professional Voice of Law Enforcement (July 2008), www.policechiefmagazine.org\/magazine"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Liu, L., Eck, J. (eds.): Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Information Science Ref. (January 2008)","DOI":"10.4018\/978-1-59904-591-7"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Groff, E., Birks, D.: Simulating crime prevention strategies: A look at the possibilities. Policing: A journal of Policy and Practice\u00a02(2), 175\u2013184","DOI":"10.1093\/police\/pan020"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Brantingham, P.J., Brantingham, P.L., Gl\u00e4sser, U.: Computer Simulation as a Research Tool in Criminology and Criminal Justice. Criminal Justice Matters\u00a0(58) (February 2005)","DOI":"10.1080\/09627250408553238"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Brantingham, P.L., Kinney, B., Gl\u00e4sser, U., Jackson, P., Vajihollahi, M.: Mastermind: Computational Modeling and Simulation of Spatiotemporal Aspects of Crime in Urban Environments. In: Liu, L., Eck, J. (eds.) Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Information Science Reference (2008)","DOI":"10.4018\/978-1-59904-591-7.ch013"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Brantingham, P.L., Gl\u00e4sser, U., Kinney, B., Singh, K., Vajihollahi, M.: A Computational Model for Simulating Spatial Aspects of Crime in Urban Environments. In: Jamshidi, M. (ed.) Proceedings of the 2005 IEEE International Conference on Systems, Man and Cybernetics, pp. 3667\u20133674 (October 2005)","DOI":"10.1109\/ICSMC.2005.1571717"},{"key":"7_CR8","unstructured":"Brantingham, P.L., Gl\u00e4sser, U., Kinney, B., Singh, K., Vajihollahi, M.: Modeling Urban Crime Patterns: Viewing Multi-Agent Systems as Abstract State Machines. In: Proc. of 12th Intl. Workshop on Abstract State Machines (ASM 2005) (March 2005)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TSMCC.2003.809867","volume":"33","author":"Y. Xue","year":"2003","unstructured":"Xue, Y., Brown, D.: A decision model for spatial site selection by criminals: a foundation for law enforcement decision support. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a033, 78\u201385 (2003)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Felson, M.: Routine Activities and Crime Prevention in the Developing Metropolis. Criminology, 911\u2013931 (1987)","DOI":"10.1111\/j.1745-9125.1987.tb00825.x"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18216-7","volume-title":"Abstract State Machines: A Method for High-Level System Design and Analysis","author":"E. B\u00f6rger","year":"2003","unstructured":"B\u00f6rger, E., St\u00e4rk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer, Heidelberg (2003)"},{"key":"7_CR12","unstructured":"Farahbod, R., Gervasi, V., Gl\u00e4sser, U.: CoreASM: An Extensible ASM Execution Engine. Fundamenta Informaticae, 71\u2013103 (2007)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Farahbod, R., Gl\u00e4sser, U., Jackson, P., Vajihollahi, M.: High Level Analysis, Design and Validation of Distributed Mobile Systems with CoreASM. In: Proceedings of 3rd International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2008) (October 2008)","DOI":"10.1007\/978-3-540-88479-8_57"},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59495-3","volume-title":"Java and the Java Virtual Machine: Definition, Verification, Validation","author":"R. St\u00e4rk","year":"2001","unstructured":"St\u00e4rk, R., Schmid, J., B\u00f6rger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer, Heidelberg (2001)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJBPIM.2006.012626","volume":"1","author":"R. Farahbod","year":"2007","unstructured":"Farahbod, R., Gl\u00e4sser, U., Vajihollahi, M.: An Abstract Machine Architecture for Web Service Based Business Process Management. International Journal of Business Process Integration and Management\u00a01, 279\u2013291 (2007)","journal-title":"International Journal of Business Process Integration and Management"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/S1389-1286(03)00247-0","volume":"42","author":"U. Gl\u00e4sser","year":"2003","unstructured":"Gl\u00e4sser, U., Gotzhein, R., Prinz, A.: The Formal Semantics of SDL-2000: Status and Perspectives. Computer Networks\u00a042(3), 343\u2013358 (2003)","journal-title":"Computer Networks"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/BFb0027231","volume-title":"Formal Methods for Industrial Applications","author":"C. Beierle","year":"1996","unstructured":"Beierle, C., B\u00f6rger, E., Durdanovic, I., Gl\u00e4sser, U., Riccobene, E.: Refining Abstract Machine Specifications of the Steam Boiler Control to Well Documented Executable Code. In: Abrial, J.-R., B\u00f6rger, E., Langmaack, H. (eds.) Dagstuhl Seminar 1995. LNCS, vol.\u00a01165, pp. 62\u201378. Springer, Heidelberg (1996)"},{"issue":"7","key":"7_CR18","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TSE.2004.25","volume":"30","author":"U. Gl\u00e4sser","year":"2004","unstructured":"Gl\u00e4sser, U., Gurevich, Y., Veanes, M.: Abstract Communication Model for Distributed Systems. IEEE Trans. on Soft. Eng.\u00a030(7), 458\u2013472 (2004)","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.tcs.2004.11.009","volume":"336","author":"U. Gl\u00e4sser","year":"2005","unstructured":"Gl\u00e4sser, U., Gu, Q.P.: Formal Description and Analysis of a Distributed Location Service for Mobile Ad Hoc Networks. Theoretical Comp. Sci.\u00a0336, 285\u2013309 (2005)","journal-title":"Theoretical Comp. Sci."},{"key":"7_CR20","unstructured":"Jensen, O., Koteng, R., Monge, K., Prinz, A.: Abstraction using ASM Tools. In: Prinz, A. (ed.) Proc. of the 14th International ASM Workshop (ASM 2007) (2007)"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1111\/j.1467-8640.1988.tb00284.x","volume":"4","author":"M.E. Bratman","year":"1988","unstructured":"Bratman, M.E., Israel, D., Pollack, M.E.: Plans and Resource-Bounded Practical Reasoning. Computational Intelligence\u00a04, 349\u2013355 (1988)","journal-title":"Computational Intelligence"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Brantingham, P.L., Gl\u00e4sser, U., Jackson, P., Vajihollahi, M.: Modeling Criminal Activity in Urban Landscapes. Technical Report SFU-CMPT-TR-2008-13, Simon Fraser University (August 2008)","DOI":"10.1007\/978-3-211-09442-6_2"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"E.W. Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A Note On Two Problems In Connection With Graphs. Numerische Mathematik\u00a01, 269\u2013271 (1959)","journal-title":"Numerische Mathematik"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89900-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T10:35:47Z","timestamp":1589193347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89900-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540898993","9783540899006"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89900-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}